{"id":2871,"date":"2019-02-14T09:17:21","date_gmt":"2019-02-14T09:17:21","guid":{"rendered":"https:\/\/www.networkportfolio.co.uk\/ncinsurance.co.uk\/?p=2871"},"modified":"2019-12-02T14:33:45","modified_gmt":"2019-12-02T14:33:45","slug":"cyber-security-threats-data-exposure","status":"publish","type":"post","link":"https:\/\/networkportfolio.co.uk\/ncinsurance.co.uk\/blog\/cyber-security-threats-data-exposure\/","title":{"rendered":"How to: Reduce data exposure from cyber security threats"},"content":{"rendered":"<p><span style=\"font-family: arial, helvetica, sans-serif;\">Cyber security threats and trends can change year over year as technology continues to advance at alarming speeds. As such, it\u2019s critical for organisations to reassess their data protection practices at the start of each new year and make achievable cyber security resolutions to help protect themselves from experiencing data exposure and paying costly fines under the GDPR.<\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;\">Implement the following resolutions to ensure you don\u2019t become the victim of a cyber-crime:<\/span><\/p>\n<h1><span style=\"font-size: 18pt; font-family: arial, helvetica, sans-serif;\">Reducing Data Exposure<\/span><\/h1>\n<h2><span style=\"font-size: 14pt; font-family: arial, helvetica, sans-serif;\"><strong>1) Provide training against cyber security threats<\/strong>\u2014<\/span><\/h2>\n<p><span style=\"font-family: arial, helvetica, sans-serif;\">Employees are your first line of defence when it comes to cyber-threats. Even the most robust and expensive data protection solutions can be compromised should an employee click a malicious link or download fraudulent software. As such, it\u2019s critical for organisations to thoroughly train personnel on common cyber security threats and how to respond.<\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;\">Employees should understand the dangers of visiting harmful websites, leaving their devices unattended and oversharing personal information on social media. Your employees should also know your cyber security policies and know how to report suspicious activity. Providing training on these topics should assist employees in reducing the risk of data exposure.<\/span><\/p>\n<h3><span style=\"font-size: 14pt; font-family: arial, helvetica, sans-serif;\"><strong>2) Install strong antivirus software and keep it updated<\/strong>\u2014<\/span><\/h3>\n<p><span style=\"font-family: arial, helvetica, sans-serif;\">Outside of training your employees on the dangers of cyber security threats, strong antivirus software is one of the best ways to protect your data. Organisations should conduct thorough research to choose software that\u2019s best for their needs. Once installed, antivirus programs should be kept up to date.<\/span><\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"alignnone wp-image-2889 size-full\" src=\"https:\/\/www.networkportfolio.co.uk\/ncinsurance.co.uk\/wp-content\/uploads\/2019\/01\/Anti-Virus.jpg\" alt=\"Anti Virus can be used to reduce the risk of data exposure\" width=\"480\" height=\"359\" srcset=\"https:\/\/networkportfolio.co.uk\/ncinsurance.co.uk\/wp-content\/uploads\/2019\/01\/Anti-Virus.jpg 480w, https:\/\/networkportfolio.co.uk\/ncinsurance.co.uk\/wp-content\/uploads\/2019\/01\/Anti-Virus-227x170.jpg 227w\" sizes=\"(max-width: 480px) 100vw, 480px\" \/><\/p>\n<h3><span style=\"font-size: 14pt; font-family: arial, helvetica, sans-serif;\"><strong>3) Instil safe web browsing practices<\/strong>\u2014<\/span><\/h3>\n<p><span style=\"font-family: arial, helvetica, sans-serif;\">Deceptive and malicious websites can easily infect your network, often leading to more serious cyber-attacks &amp; data exposure. To protect your organisation, employees should be trained on proper web usage and instructed to only interact with secured websites.<\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;\">For further protection, companies should consider blocking known cyber security threats and potentially malicious web-pages outright.<\/span><\/p>\n<h3><span style=\"font-size: 14pt; font-family: arial, helvetica, sans-serif;\"><strong>4) Create strong password policies<\/strong>\u2014<\/span><\/h3>\n<p><span style=\"font-family: arial, helvetica, sans-serif;\">Ongoing password management can help prevent unauthorised attackers from compromising your organisation\u2019s password-protected information. Effective password management protects the integrity, availability and confidentiality of an organisation\u2019s passwords.<\/span><\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"alignnone wp-image-2883 size-full\" src=\"https:\/\/www.networkportfolio.co.uk\/ncinsurance.co.uk\/wp-content\/uploads\/2019\/01\/Password.jpg\" alt=\"Having a weak password can result in greater cyber security threats\" width=\"480\" height=\"247\" srcset=\"https:\/\/networkportfolio.co.uk\/ncinsurance.co.uk\/wp-content\/uploads\/2019\/01\/Password.jpg 480w, https:\/\/networkportfolio.co.uk\/ncinsurance.co.uk\/wp-content\/uploads\/2019\/01\/Password-260x134.jpg 260w\" sizes=\"(max-width: 480px) 100vw, 480px\" \/><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;\">Above all, you\u2019ll want to create a password policy that specifies all of the organisation\u2019s requirements related to password management. This policy should require employees to change their password on a regular basis, avoid using the same password for multiple accounts and use special characters in their password.<\/span><\/p>\n<h3><span style=\"font-size: 14pt; font-family: arial, helvetica, sans-serif;\"><strong>5)\u00a0<\/strong><strong>Use multi-factor authentication<\/strong>\u2014<\/span><\/h3>\n<p><span style=\"font-family: arial, helvetica, sans-serif;\">While complex passwords can help deter cyber criminals, they can still be cracked. To further prevent cyber criminals from gaining access to employee accounts, multi-factor authentication is key. Multi-factor authentication adds a layer of security that allows companies to protect against compromised credentials.<\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;\">Through this method, users must confirm their identity by providing extra information (eg a phone number, unique security code) when attempting to access corporate applications, networks and servers.<\/span><\/p>\n<h3><span style=\"font-size: 14pt; font-family: arial, helvetica, sans-serif;\"><strong>6) Get vulnerability assessments<\/strong>\u2014<\/span><\/h3>\n<p><span style=\"font-family: arial, helvetica, sans-serif;\">The best way to evaluate your company\u2019s data exposure is through a vulnerability assessment. Using a system of simulated attacks and stress tests, vulnerability assessments can help you uncover entry points into your system. Following these tests, security experts compile their findings and provide recommendations for improving network and data safety.<\/span><\/p>\n<h3><span style=\"font-size: 14pt; font-family: arial, helvetica, sans-serif;\"><strong>7) Patch systems regularly and keep them updated<\/strong>\u2014<\/span><\/h3>\n<p><span style=\"font-family: arial, helvetica, sans-serif;\">A common way cyber criminals gain entry into your system is by exploiting software vulnerabilities. To prevent this, it\u2019s critical that you update applications, operating systems, security software and firmware on a regular basis.<\/span><\/p>\n<h3><span style=\"font-size: 14pt; font-family: arial, helvetica, sans-serif;\"><strong>8) Back up your data<\/strong>\u2014<\/span><\/h3>\n<p><span style=\"font-family: arial, helvetica, sans-serif;\">In the event that your system is compromised, it\u2019s important to keep backup files. Failing to do so can result in the loss of critical business or proprietary data.<\/span><\/p>\n<h3><span style=\"font-size: 14pt; font-family: arial, helvetica, sans-serif;\"><strong>9) Understand phishing threats and how to respond<\/strong>\u2014<\/span><\/h3>\n<p><span style=\"font-family: arial, helvetica, sans-serif;\">In broad terms, phishing is a method cyber-criminals use to gather personal information. In these scams, phishers send an email or direct users to fraudulent websites, asking victims to provide sensitive information.<\/span><\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-2888\" src=\"https:\/\/www.networkportfolio.co.uk\/ncinsurance.co.uk\/wp-content\/uploads\/2019\/01\/Phishing-Credit-card.jpg\" alt=\"\" width=\"480\" height=\"320\" srcset=\"https:\/\/networkportfolio.co.uk\/ncinsurance.co.uk\/wp-content\/uploads\/2019\/01\/Phishing-Credit-card.jpg 480w, https:\/\/networkportfolio.co.uk\/ncinsurance.co.uk\/wp-content\/uploads\/2019\/01\/Phishing-Credit-card-255x170.jpg 255w\" sizes=\"(max-width: 480px) 100vw, 480px\" \/><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;\">These emails and websites are designed to look legitimate and trick individuals into providing credit card numbers, account numbers, passwords, usernames or other sensitive information. Phishing is becoming more sophisticated by the day, and it\u2019s more important than ever to understand the different types of attacks, how to identify them and preventive measures you can implement to keep your organisation safe.<\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;\">As such, it\u2019s critical to train employees on common phishing scams and other cyber-security concerns. Provide real-world examples during training to help them better understand what to look for.<\/span><\/p>\n<h3><span style=\"font-size: 14pt; font-family: arial, helvetica, sans-serif;\"><strong>10) Create an incident response plan<\/strong>\u2014<\/span><\/h3>\n<p><span style=\"font-family: arial, helvetica, sans-serif;\">Most organisations have some form of data protection in place. While these protections are critical for minimising the damages caused by a breach, they don\u2019t provide clear action steps following an attack. That\u2019s where cyber-incident response plans can help.<\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;\">While cyber-security programmes help secure an organisation\u2019s digital assets, cyber-incident response plans provide clear steps for companies to follow when a cyber-event occurs. Response plans allow organisations to notify impacted customers and partners quickly and efficiently, limiting financial and reputational damages.<\/span><\/p>\n<h2>Dealing with cyber security threats<\/h2>\n<table class=\"alignleft\" style=\"border-color: #030101; width: 600px; background-color: #b7bf10;\" border=\"2\" cellpadding=\"10\">\n<tbody>\n<tr>\n<td>\n<p style=\"text-align: center;\"><span style=\"font-family: arial, helvetica, sans-serif;\"><em>Regardless of the precautions your business takes, you can never be 100% sure you won&#8217;t find yourself the victim of a cyber attack. In the event of such an occurrence, the damage to the organisation can be limited with insurance.\u00a0<\/em><\/span><\/p>\n<p style=\"text-align: center;\"><span style=\"font-family: arial, helvetica, sans-serif;\"><em><a href=\"https:\/\/www.networkportfolio.co.uk\/ncinsurance.co.uk\/commercial-insurance\/cyber-liability\/\"><strong>A cyber liability policy from NC Insurance<\/strong><\/a> can protect you against electronic damages\u2013 including data breaches, business interruption, intellectual property and cyber extortion \u2013 and the associated costs, from paying compensation to legal fees and regulatory fines.<\/em><\/span><\/p>\n<p style=\"text-align: center;\"><span style=\"font-family: arial, helvetica, sans-serif;\"><em>To find out more, call the team now on <a href=\"tel:01914821219\"><strong>0191 482 1219<\/strong><\/a><\/em><\/span><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><span style=\"font-family: arial, helvetica, sans-serif;\"><em>Want to read more about protecting your business from cyber threats?<\/em><\/span><\/p>\n<ul>\n<li style=\"text-align: left;\"><strong><span style=\"font-family: arial, helvetica, sans-serif;\"><em><a href=\"https:\/\/www.networkportfolio.co.uk\/ncinsurance.co.uk\/blog\/2018\/11\/13\/common-cyber-attacks\/\">Keep your organisation safe from these common cyber attacks<\/a><\/em><\/span><\/strong><\/li>\n<li style=\"text-align: left;\"><strong><span style=\"font-family: arial, helvetica, sans-serif;\"><em><a href=\"https:\/\/www.networkportfolio.co.uk\/ncinsurance.co.uk\/blog\/cyber-survey\/\">The 2018 Cyber-Security breaches survey overview<\/a><\/em><\/span><\/strong><br \/>\n<table style=\"height: 32px;\" width=\"124\">\n<tbody>\n<tr>\n<td style=\"width: 34px;\"><a href=\"https:\/\/www.facebook.com\/NCinsurance.Brokers\/\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone wp-image-2152 size-full\" src=\"https:\/\/www.networkportfolio.co.uk\/ncinsurance.co.uk\/thirdsectorprotect\/wp-content\/uploads\/sites\/6\/2018\/09\/facebook.png\" alt=\"\" width=\"120\" height=\"120\" \/><\/a><\/td>\n<td style=\"width: 34px;\"><a href=\"https:\/\/twitter.com\/_ncinsurance?lang=en-gb\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone wp-image-2154 size-full\" src=\"https:\/\/www.networkportfolio.co.uk\/ncinsurance.co.uk\/thirdsectorprotect\/wp-content\/uploads\/sites\/6\/2018\/09\/twitter.png\" alt=\"\" width=\"120\" height=\"120\" \/><\/a><\/td>\n<td style=\"width: 34px;\"><a href=\"https:\/\/www.linkedin.com\/company\/ncinsurance\/\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone wp-image-2153 size-full\" src=\"https:\/\/www.networkportfolio.co.uk\/ncinsurance.co.uk\/thirdsectorprotect\/wp-content\/uploads\/sites\/6\/2018\/09\/LinkedIn.png\" alt=\"\" width=\"120\" height=\"108\" \/><\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Cyber security threats and trends can change year over year as technology continues to advance at alarming speeds. As such, it\u2019s critical for organisations to reassess their data protection practices at the start of each new year and make achievable cyber security resolutions to help protect themselves from experiencing data exposure and paying costly fines [&hellip;]<\/p>\n","protected":false},"author":10,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false},"categories":[9,10,17,1],"tags":[181,103,74],"acf":[],"_links":{"self":[{"href":"https:\/\/networkportfolio.co.uk\/ncinsurance.co.uk\/wp-json\/wp\/v2\/posts\/2871"}],"collection":[{"href":"https:\/\/networkportfolio.co.uk\/ncinsurance.co.uk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/networkportfolio.co.uk\/ncinsurance.co.uk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/networkportfolio.co.uk\/ncinsurance.co.uk\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/networkportfolio.co.uk\/ncinsurance.co.uk\/wp-json\/wp\/v2\/comments?post=2871"}],"version-history":[{"count":1,"href":"https:\/\/networkportfolio.co.uk\/ncinsurance.co.uk\/wp-json\/wp\/v2\/posts\/2871\/revisions"}],"predecessor-version":[{"id":4188,"href":"https:\/\/networkportfolio.co.uk\/ncinsurance.co.uk\/wp-json\/wp\/v2\/posts\/2871\/revisions\/4188"}],"wp:attachment":[{"href":"https:\/\/networkportfolio.co.uk\/ncinsurance.co.uk\/wp-json\/wp\/v2\/media?parent=2871"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/networkportfolio.co.uk\/ncinsurance.co.uk\/wp-json\/wp\/v2\/categories?post=2871"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/networkportfolio.co.uk\/ncinsurance.co.uk\/wp-json\/wp\/v2\/tags?post=2871"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}